Lecture 3 - Block Ciphers, DES Flashcards

1
Q

Semantic Security

A

Relaxes perfect secrecy by allowing a tiny probability of security to fail (e.g. truly random distribution computationally indistinguishable from pseudorandom distribution)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What makes one-time key semantically secure?

A

If advantage is negligible for all efficient statistical tests (attacker can’t tell if you encrypted m1 or m2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Are stream ciphers semantically secure?

A

Yes, assuming the PRG is semantically secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are block ciphers?

A

Block cipher maps n bits of plaintext to n bits of ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are two examples of block ciphers?

A

3DES and AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PRF (pseudorandom function)

A

The function takes a key and outputs something pseudorandom (but not necessarily invertible)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PRP (Pseudorandom Permutation)

A

K x X -> X (maps one to one in the same space) which makes it invertible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What makes a PRF secure?

A

If the uniform distribution of a PRF is indistinguishable from a truly random function’s uniform distribution (Eve can’t tell if she’s interacting with a random function or truly random function)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is PRG secure?

A

If PRG based on secure PRF, it will also be secure. (PRG expands a key into a random keystream by concatenating f(k,0) || f(k,1)….) where f is prf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is substitution?

A

Also called s-boxes that substitute one binary string for another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is permutation?

A

Done with p-boxes. Binary string gets reordered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confusion

A

Substitution. Relationship between key and ciphertext. If 1 bit of key gets modified, almost all bits of the ciphertext get modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Diffusion

A

Permutation. Relationship between plaintext and ciphertext. One bit of changing plaintext will change multiple bits of ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the core idea behind DES?

A

Feistal Network: given arbitrary functions you build an invertible function (so that you can decrypt)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Are feistal networks secure?

A

Yes if built on secure prf/prp (e.g. 3 round fiestal network uses a prf on each round with a unique round key for each round. And the whole fiestal network becomes a secure PRP if based on secure PRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you strengthen DES construction?

A

Method 1: Triple-DES (E(k1, D(k2, E(k3,m)))

17
Q

Double DES Attack

A

Meet in the middle attack: c = Ek2(Ek1(m))) can equal D(k2,c) = E(k1,m) which means you can create a table of all encryptions of the message with variety of k1s and then create a table of decryptions for c with k2 and find a match which means k1 and k2 are correct

18
Q

Attacks on implementation like 3DES?

A

Side channel attacks: measuring time to detect encryption/decryption or Fault Attacks making an error on the last round exposing secret key k